Cisco ASA 5505 unable to authenicate against Raduis, NT or other remote server

I have a ASA 5505 which I recently upgraded our other server system I am not a Cisco guy. I set up the VPN to authenticate against a remote server I have tried radius, NT and when you test them the network credentials work. However the only way I can give users access is to add them as a local user. Secondly the remote user can not access the internet via browsers on their laptops where they could before they can access internal resources mail files etc. So if someone can help point me to activating remote authentication being able to have users internet access when connected to the VPN.

Post the config minus identifying information to make sure you have auth servers defined. Make sure your VPN is defined to use aaa and not local.
Check whether the radius servers are configured to respond to the VPN type request.

I'll have to get the config on Monday. But I configured both a Radius and NT server per Cisco and in Asdm you can test authenticate against both servers successfully but when you login the ASA will only authenticated against the AAA local users. Now I am not sure what step I am missing previously there was a group name along with the username and password when you logged in now it's just the username and password fields the previous server was 2003 sbs where we are on server 2012. I will post the config as soon as I can.

Earn your B.S. in Network Operations and Security and become a network and IT security expert. This WGU degree program curriculum was designed with tech-savvy, self-motivated students in mind – allowing you to use your technical expertise, to address real-world business problems.

Look at the client side network mapping see what it has for interesting traffic and what is allowed

I think your nat0 and your inside-network/24 is where.

Do you want to exclude all IPSEC/VPN traffic from going through ACL rules?
If yes, add the networks to the nat0 rule.
If you want to control what VPN users can and can not access, make sure to setup the ACL rules for VPN ips to the various locations.

Featured Post

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

Both in life and business – not all partnerships are created equal.
As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …